One platform to build, fine-tune, and deploy ML models. No MLOps team required.
Access Gemini 3 and 200+ models. Build chatbots, agents, or custom models with built-in monitoring and scaling.
Try Free
AI-powered service management for IT and enterprise teams
Enterprise-grade ITSM, for every business
Give your IT, operations, and business teams the ability to deliver exceptional services—without the complexity. Maximize operational efficiency with refreshingly simple, AI-powered Freshservice.
Command line and wxWidgets UI for an HTTP(S) proxy that can tunnel web requests over one or more SSH tunnels to one or more web specified servers, while using a direct connection for all other traffic.
This tool lets you login with SSH to a group of machines and interact with them as if they were one machine. Each command that you enter is run in parallel on all machines in the group. The output from each machine is printed separately.
pyomnet provide an object-oriented way to define the network topology.
It's a good way to illustrate network in an abstract way.
pyomnet could generate the NED scenario and configuration(latter) for OMNeT++ simulation tool.
A tool to quickly change, either manually or through autosensing, your browser proxy settings, network shares, host file, default printer, and desktop background.
Compliant and Reliable File Transfers Backed by Top Security Certifications
Cerberus FTP Server delivers SOC 2 Type II certified security and FIPS 140-2 validated encryption.
Stop relying on non-certified, legacy file transfer tools that creak under the weight of modern security demands. Get full audit trails, advanced access controls and more supported by an award-winning team of experts. Start your free 25-day trial today.
Started as part of the Google Summer of Code 2005, this tool adjusts security settings on Linux systems, including firewall and SELinux policies. This tool aims to replace the system-config-securitylevel tool from Red Hat and Fedora Core systems.
"Traffic" is ethernet/ip traffic generator. The tool consists of server and GUI application.
Typical configuration is to have at least 2 servers and 1 or more client machines, where the servers are controlled and results are displayed.
Minimal HTTP proxy written in Python. Mostly useful as debugging tool for HTTP traffic inspection. Asynchat-based, handles multiple connections in single thread.
Network monitoring tool, written in Python, designed to harvest status data from a list of clients and present that data to anyone who wishes to see it via a web browser.
NHMON is a GUI tool geared towards visual monitoring of a large number (hundreds) of hosts in one interface. Supports may backends, such as "Eddie", HTTP, SMTP, etc.
Qualm is a graphical tool for persistent resource management. While Qualm is initially aimed at providing an entirely new method of doing disk quota management, qualm can be used for managing any persistent finite resource.
Phasault is a EMail Tool-Client, which provides some features you can't see in other E-mail Clients. Coded in Python using Tk as GUI. Works in Win32 and Unix/Linux (with python interpreter installed), and also planning to create stand-alone distribution o
Logpecker is a tool for syslog files like /var/log/messages. More flexible than a simple regexp matcher, you can use syslog facility and priority. Messages that appear too often are sieved out. Generates root-tail tickers, reports, active event lists
Shadow Watcher is a Peer to Peer log sharing tool for the security analyst. Consider it a "community watch" program which allows you to keep your system secure from the threats on the internet and help others do the same.
NipperME or 'Nipper Made Easy', is a GUI application that sits on top of the commandline tool Nipper located at http://nipper.titania.co.uk/ This tool provides Nipper commandline options presented to you in a nicely laid out GUI.
This tool can be used to create a GNS3/Dynamips replica of a real network by simply connecting to the network and using SNMP. Please see the instructions in the wiki.
This project offers a client/server tool to analyze the /var/log/auth.log in order to gather information about the login attempts. The information is sent to a server side where the datas are stored in a sqlite database.